-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Vendor-Initiated Bulletin VB-96.15
September 16, 1996
Topic: Patch for system call security issue
Source: The Santa Cruz Operation
To aid in the wide distribution of essential security information, the CERT
Coordination Center is forwarding the following information from The Santa
Cruz Operation. They urge you to act on this information as soon as possible.
Contact information for The Santa Cruz Operation is included in the forwarded
text below; please contact them if you have any questions or need further
information.
Please note that The Santa Cruz Operation intends to update this
bulletin as new information becomes available. Please check their
server from time to time for updates to this file:
ftp://ftp.sco.COM/SSE/security_bulletins/SB.96:02a
=======================FORWARDED TEXT STARTS HERE============================
===========================================================================
SCO Security Bulletin 96:002
September 4, 1996
Patch for system call security issue
- ---------------------------------------------------------------------------
The Santa Cruz Operation has discovered the following problem present in
our software:
I. Description
A problem in a particular system call may allow unauthorized
access to the system. The resulting access may lead to unauthorized
root access to the system.
II. Impact
Any user with an account on the system may be able to gain
unauthorized access to system or user files, which may then lead to
unauthorized root access.
III. Releases
This problem exists on the following releases of SCO products:
SCO(R) UnixWare(R) release 2.0.x and 2.1.0
IV. Solution
SCO is providing Program Temporary Fix (PTF) 3063 to address the
issue. This PTF is available for SCO UnixWare release 2.1.0. SCO intends
to release a PTF for SCO UnixWare release 2.0.3 in the near future.
A workaround for users of SCO UnixWare release 2.0.x or for those
who are not yet able to install this PTF follows:
As root, execute these commands on the system console:
# /etc/conf/bin/idtune -f RSTCHOWN 1
# /etc/conf/bin/idbuild -B
# init 6
This procedure sets a kernel parameter that prevents the problem from
occuring, relinks the kernel, and reboots the system.
You can download the PTF as follows:
Anonymous ftp (World Wide Web URL)
- -------------
ftp://ftp.sco.COM/UW21/ptf3063.Z (patch image, compressed)
ftp://ftp.sco.COM/UW21/ptf3063.txt (cover letter/installation notes)
Compuserve
- ----------
PTF 3063 is also available in the UNIXWARE forum on Compuserve.
SCO Online Support (SOS) BBS
- ----------------------------
PTF 3063 can also be downloaded interactively via X, Y, or Z MODEM or Kermit,
using the SCO Online Support System (SOS). Follow the menus selections under
"Toolchest" from the main SOS menu.
The phone numbers available for interactive transfer from SOS are:
1-408-426-9495 (USA)
+44 (0)1923 210 888 (United Kingdom)
Checksums
- ---------
MD5
- ---
MD5 (ptf3063.Z) = 1093420123c9bff603bd3c32a3867dcd
MD5 (ptf3063.txt) = 0ffa24e5e0d9a8caf8f4076149d782c3
sum -r (on UnixWare)
- ------
48571 391 ptf3063.Z
20546 3 ptf3063.txt
This bulletin is available for anonymous ftp download from
ftp://ftp.sco.COM/SSE/security_bulletins/SB.96:02a, and will be updated
as new information becomes available.
If you have further questions, contact your support provider. If you
need to contact SCO, please send electronic mail to support@sco.COM, or
contact SCO as follows.
USA/Canada: 6am-5pm Pacific Daylight Time (PDT)
-----------
1-800-347-4381 (voice)
1-408-427-5443 (fax)
Pacific Rim, Asia, and Latin American customers: 6am-5pm Pacific
------------------------------------------------ Daylight Time
(PDT)
1-408-425-4726 (voice)
1-408-427-5443 (fax)
Europe, Middle East, Africa: 9am-5:30pm Greenwich Mean Time (GMT)
----------------------------
+44 (0)1923 816344 (voice)
+44 (0)1923 817781 (fax)
========================FORWARDED TEXT ENDS HERE=============================
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident Response
and Security Teams (FIRST).
We strongly urge you to encrypt any sensitive information you send by email.
The CERT Coordination Center can support a shared DES key and PGP. Contact
the CERT staff for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key
CERT Contact Information
- ------------------------
Email cert@cert.org
Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST
(GMT-5)/EDT(GMT-4), and are on call for
emergencies during other hours.
Fax +1 412-268-6989
Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA
CERT publications, information about FIRST representatives, and other
security-related information are available from
http://www.cert.org/
ftp://info.cert.org/pub/
CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce
To be added to our mailing list for CERT advisories and bulletins, send your
email address to
cert-advisory-request@cert.org
CERT is a service mark of Carnegie Mellon University.
This file: ftp://info.cert.org/pub/cert_bulletins/VB-96.15.sco
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMj14SXVP+x0t4w7BAQHLxAP+L6U21ViaGXeIHNTSDHhOC+cZdXL+TLrP
MdEPugWAHDCOUXxZuYo49jYobJ+cO3nqyw+gqi5clZOaWJ7ChM1pWBiD1Abuu3hi
Y39yBKFmJ7Ra3Zvbk/GLEcpShp+5YRUPmF6Lenf3nfze6WmXUUKXm12YKq5Gt8hB
J64cQEpOvoE=
=kg5h
-----END PGP SIGNATURE-----